SlideShare a Scribd company logo
1 of 30
Network Management,
Monitoring and Control
Elements of Network Management
 Fault
 Configuration
 Accounting
 Performance
 Security
Fault Management Overview
 When fault occurs
 Determine where
 Isolate rest of network so it can continue to function
 Reconfigure or modify network to minimize impact of operation without failed
components
 Repair or replace failed components
 Fault is abnormal condition that requires action to repair
 Errors (e.g. single bit error on line) occur and are not faults
Fault Management User Requirements
 Fast and reliable problem resolution
 Immediate notification
 Impact and duration minimized by redundant components and
routes
 Fault tolerance
 Fault management capability should be redundant
 After correction, fault management must ensure problem is truly
resolved and no new problems introduced
 Problem tracking and control
 Minimal effect on network performance
Configuration and Name Management
Overview
 Choose appropriate software and attributes and values (e.g., a transport layer
retransmission timer) for device depending on function(s)
 Initializing network and gracefully shutting down
 Maintaining, adding, and updating relationships among components
 Status of components during network operation
Configuration and Name Management User
Requirements
 Startup and shutdown
 Unattended
 Need to identify components of network and connectivity
 Define and modify default attributes
 Load predefined attributes
 Change connectivity
 Reconfiguration
 Status information and notification of changes
 Routine or request driven reports
 Authorized users (operators) only to manage and control operation (e.g.,
software distribution and updating)
Accounting Management
Overview
 Individual cost centers or projects charged for use of network services
 Network manager needs to be able to track use of network
 User or group may be abusing access
 Users may be making inefficient use of network
 Need to plan for network growth
Accounting Management
User Requirements
 Needs to specify sort of accounting information recorded at various nodes
 Interval between successive sendings of information
 Algorithms used in calculating charges
 Accounting reports under network manager control
 Verify users' authorization to access and manipulate accounting information
Performance Management Overview
 Monitoring
 Tracks activities
 What is the level of capacity utilization?
 Is there excessive traffic?
 Has throughput been reduced to unacceptable levels?
 Are there bottlenecks?
 Is response time increasing?
 Controlling
 Make adjustments to improve performance
 Identify resources to be monitored
 Metrics and values for resources
Performance Management
User Requirements
 Must be known in sufficient detail to assess user queries
 Applications need consistently good response time
 Performance statistics help planning, management and maintenance
 Recognize potential bottlenecks before they cause problems
 Capacity planning based on performance information
Security Management
Overview
 Generating, distributing, and storing encryption keys
 Passwords and access control information maintained and distributed
 Monitoring and controlling access
 Logging
 Collection, storage, and examination of audit records and security logs
Security Management
User Requirements
 Facilities available for authorized users only
 Users want to know proper security in force and effective
 Management of security facilities is secure
Network Management Systems
 Collection of tools for network management
 Single operator interface
 Powerful, user friendly command set
 Performing most or all management tasks
 Minimal amount of separate equipment
 i.e. use existing equipment
 View entire network as unified architecture
 Active elements provide regular feedback
Key Elements
 Management station or manager
 Agent
 Management information base
 Network management protocol
Figure 17.1 Elements of a Network
Management System
Management Station
 Stand alone system or part of shared system
 Interface for human network manager
 Set of management applications
 Data analysis
 Fault recovery
 Interface to monitor and control network
 Translate manager’s requirements into monitoring and control of remote elements
 Data base of network management information extracted from managed entities
Management Agent
 Hosts, bridges, hubs, routers equipped with agent software
 Allow them to be managed from management station
 Respond to requests for information
 Respond to requests for action
 Asynchronously supply unsolicited information
Management Information Base
 MIB
 Representation of network resources as objects
 Each object a variable representing one aspect of managed object
 MIB is collection of access points at agent for management of station
 Objects standardized across class of system
 Bridge, router etc.
Network Management Protocol
 Link between management station and agent
 TCP/IP uses SNMP
 OSI uses Common Management Information Protocol (CMIP)
 SNMPv2 (enhanced SNMP) for OSI and TCP/IP
Management Layout
 May be centralized in simple network
 May be distributed in large, complex network
 Multiple management servers
 Each manages pool of agents
 Management may be delegated to intermediate manager
Figure 17.2 Example Distributed Network Management
Configuration
Future Fit Network Management and
Monitoring
Thank You

More Related Content

Similar to Network Management, Monitoring and Control.pptx

Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
E business solutions l07-netman
E business solutions l07-netmanE business solutions l07-netman
E business solutions l07-netmanPeter Merchant
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architecturescsk selva
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations centerSatish Chavan
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdfEidTahir
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdfidrissaeed
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network managementbhavikaorg
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptxtahaazad2
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on NetworksIOSR Journals
 

Similar to Network Management, Monitoring and Control.pptx (20)

Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
E business solutions l07-netman
E business solutions l07-netmanE business solutions l07-netman
E business solutions l07-netman
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Best practices for building network operations center
Best practices for building  network operations centerBest practices for building  network operations center
Best practices for building network operations center
 
009694598.pdf
009694598.pdf009694598.pdf
009694598.pdf
 
Chapter 20.pdf
Chapter 20.pdfChapter 20.pdf
Chapter 20.pdf
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Unit 1 network management
Unit 1 network managementUnit 1 network management
Unit 1 network management
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
Net Mng1.pptx
Net Mng1.pptxNet Mng1.pptx
Net Mng1.pptx
 
Hp open view
Hp open viewHp open view
Hp open view
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
Ch10 Conducting Audits
Ch10 Conducting AuditsCh10 Conducting Audits
Ch10 Conducting Audits
 
RMC: Real-Time Monitoring and Controlling Approach on Networks
RMC: Real-Time Monitoring and Controlling Approach on  NetworksRMC: Real-Time Monitoring and Controlling Approach on  Networks
RMC: Real-Time Monitoring and Controlling Approach on Networks
 
The Information Office
The Information OfficeThe Information Office
The Information Office
 

Recently uploaded

BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 

Recently uploaded (7)

BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 

Network Management, Monitoring and Control.pptx

  • 2.
  • 3.
  • 4. Elements of Network Management  Fault  Configuration  Accounting  Performance  Security
  • 5. Fault Management Overview  When fault occurs  Determine where  Isolate rest of network so it can continue to function  Reconfigure or modify network to minimize impact of operation without failed components  Repair or replace failed components  Fault is abnormal condition that requires action to repair  Errors (e.g. single bit error on line) occur and are not faults
  • 6. Fault Management User Requirements  Fast and reliable problem resolution  Immediate notification  Impact and duration minimized by redundant components and routes  Fault tolerance  Fault management capability should be redundant  After correction, fault management must ensure problem is truly resolved and no new problems introduced  Problem tracking and control  Minimal effect on network performance
  • 7. Configuration and Name Management Overview  Choose appropriate software and attributes and values (e.g., a transport layer retransmission timer) for device depending on function(s)  Initializing network and gracefully shutting down  Maintaining, adding, and updating relationships among components  Status of components during network operation
  • 8. Configuration and Name Management User Requirements  Startup and shutdown  Unattended  Need to identify components of network and connectivity  Define and modify default attributes  Load predefined attributes  Change connectivity  Reconfiguration  Status information and notification of changes  Routine or request driven reports  Authorized users (operators) only to manage and control operation (e.g., software distribution and updating)
  • 9. Accounting Management Overview  Individual cost centers or projects charged for use of network services  Network manager needs to be able to track use of network  User or group may be abusing access  Users may be making inefficient use of network  Need to plan for network growth
  • 10. Accounting Management User Requirements  Needs to specify sort of accounting information recorded at various nodes  Interval between successive sendings of information  Algorithms used in calculating charges  Accounting reports under network manager control  Verify users' authorization to access and manipulate accounting information
  • 11. Performance Management Overview  Monitoring  Tracks activities  What is the level of capacity utilization?  Is there excessive traffic?  Has throughput been reduced to unacceptable levels?  Are there bottlenecks?  Is response time increasing?  Controlling  Make adjustments to improve performance  Identify resources to be monitored  Metrics and values for resources
  • 12. Performance Management User Requirements  Must be known in sufficient detail to assess user queries  Applications need consistently good response time  Performance statistics help planning, management and maintenance  Recognize potential bottlenecks before they cause problems  Capacity planning based on performance information
  • 13. Security Management Overview  Generating, distributing, and storing encryption keys  Passwords and access control information maintained and distributed  Monitoring and controlling access  Logging  Collection, storage, and examination of audit records and security logs
  • 14. Security Management User Requirements  Facilities available for authorized users only  Users want to know proper security in force and effective  Management of security facilities is secure
  • 15. Network Management Systems  Collection of tools for network management  Single operator interface  Powerful, user friendly command set  Performing most or all management tasks  Minimal amount of separate equipment  i.e. use existing equipment  View entire network as unified architecture  Active elements provide regular feedback
  • 16. Key Elements  Management station or manager  Agent  Management information base  Network management protocol
  • 17. Figure 17.1 Elements of a Network Management System
  • 18. Management Station  Stand alone system or part of shared system  Interface for human network manager  Set of management applications  Data analysis  Fault recovery  Interface to monitor and control network  Translate manager’s requirements into monitoring and control of remote elements  Data base of network management information extracted from managed entities
  • 19. Management Agent  Hosts, bridges, hubs, routers equipped with agent software  Allow them to be managed from management station  Respond to requests for information  Respond to requests for action  Asynchronously supply unsolicited information
  • 20. Management Information Base  MIB  Representation of network resources as objects  Each object a variable representing one aspect of managed object  MIB is collection of access points at agent for management of station  Objects standardized across class of system  Bridge, router etc.
  • 21. Network Management Protocol  Link between management station and agent  TCP/IP uses SNMP  OSI uses Common Management Information Protocol (CMIP)  SNMPv2 (enhanced SNMP) for OSI and TCP/IP
  • 22. Management Layout  May be centralized in simple network  May be distributed in large, complex network  Multiple management servers  Each manages pool of agents  Management may be delegated to intermediate manager
  • 23. Figure 17.2 Example Distributed Network Management Configuration
  • 24. Future Fit Network Management and Monitoring
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.